Professional Documents
Culture Documents
-----
Web Application Hacking and Security
------------------------------------
Website: Collecetion of pages is known as website.
Types of Websites
Static : A Website will have no database inside it hence user can see the content
of the website but can not input anything from users's side.
Dynamic : These websites carry database with in hence it has lots of user
interaction area's from where user eneters information/data which goes and save in
the backend.
www.owasp.org
SQL Injection
-------------
SQL : Structured Query Language
Target : safesecurities.com.pk
userid=osama admin
password=bomb admin
'or'1'='1
D : Damn
V : Vulnerable
W : Web
A : Application
Download : www.dvwa.org
Requirements
------------
1. XAMPP Server (To make your computer as server)
X : Cross Platform
A : Apache
M : MY-SQL
P : PHP
P : Perl
Download: apachefriends.org
2. DVWA :Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn
vulnerable. Its main goals are to be an aid for security professionals to test
their skills and tools in a legal environment, help web developers better
understand the processes of securing web applications and aid teachers/students to
teach/learn web application security in a class room environment.
127.0.0.1/dvwa
username=admin
password:password
Step 1: Target
http://192.168.235.174/dvwa/vulnerabilities/sqli/
GET : www.gmail.com/php?id=10
POST : www.gmail.com/id/
http://192.168.235.174/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit#
Step 4: Total number of columns from the respective table where id is a column.
http://192.168.235.174/dvwa/vulnerabilities/sqli/?id=1' order by 1--
+&Submit=Submit#
Step 7: Get the entire tables of the webiste from the database.
Schema: Database ki MAA.
Tables :information_schema.tables
Columns:information_schema.columns
Bypassing Firewall aka Union Based Injection via Web Application Firewall
techniques
--------------------------------------------
Target: multan.gov.pk
Bypassing Technique 1:
Upper Lower Case
union select
UnIoN sElEcT -> new payload
/*!UnIoN*/ /*!SeLeCt*/
My-SQL
1.00.00 : 10000
2.00.00 :20000
3.00.00
4.00.00
5.00.00 : 50000
Secure
-------
1. Do not run waf with default security settings
2. Keep update on new blacklisted parameters for waf
3. Make sure you do the custom changes in the WAF as per attack you are getting
4. Never off the firewall interms of fast response expectation in traffic.
5. have good validation of received queries and inputs at server level also.
checkurcardhackedornot.com
Card no Expiry Date and CVV : Check
oncetherewasacrow
3. *&Ig3SimG&*
4. Active 2 Step Verification in your Gmail.
5. Facebook: Backupcodes
6. Always check ur login activites from Gmail to see any unauthorised access.
Requirements
--------------
1. OllyDBG
2. Perfect Keylogger
3. Windows Platform
Target : http://www.blazingtools.com/downloads.html
Wifi Hacking
-------------
Wifi Hacking: Wifi Stands for wireless fidelity. It works on protocol 802.11a
onwards. Goal is to provide a wireless connectivty between hosts for data and
information transfer and establish a valid communication channel for the same.
Requirement
-----------
1. Kali Linux 1.8 version (old)
2. airmon-ng : This application is a CLI based used to put your wifi device inot
monitoring mode and check if its capable of proceeding with the attack.
3. airodump-ng : This application will help you to dump the air packets and
identofy that how many wifi access points are there near by you so that you can
select the target to test its security.
4.macchanger*: This helps you to spoof your wifi adpaters real identity with fake
mac address in case you want to do anonymous security testing.
5. aircrack-ng : This application will help you to crack the key which you
extracted while wifi hacking process and will help you to match with the dictionary
and if found will show the key.
Example: Router DDOS Attack, DHCP Starvation Attack with Yersinia and websploit
wifi jammer
Source Tute:https://www.youtube.com/watch?v=I4OPAdE5yv8